摘要 |
<p>An authenticator for digital data is derived by generating a numerical array, using a secret key to controllably shift the relative positions of the elements of the array, and applying the scrambled array to a message to act as an authenticator for that message. The method allows a high level of security and minimises the risk of a system, such as an intelligent portable token and reader system, being compromised. A validation procedure for such a system is also described, using the authenticator.</p> |